Skip to content

Unable to reach instances in my default VPC

0

I had created multiple instances in my defualt-VPC. I had played with AWS VPN services, and after that I removed them. While removing I must have removed something I shouldn't have and now I am not able to reach my VMs.

I created a new VPC and compared and created an instance and I am able to reach the VM. Then I compared my default-VPC configuration and new VPC configuration and they seem identical.

I have two public subnets one each in two availability zones. Both have "Auto-assign public IPv4 address" set, and the instance has a public IP assigned.

Both are connected to the route table (only one in the VPC). The route table has two route entries, a) 0.0.0.0/0 with target igw b) Private subnet with target local Both have propagation disabled The ipACL table has both inbound and outbound rules permitting all traffics.

The security group allows all traffic.

The status checks for the instance I created in the default VPC, says it passed system and instance reachability tests. Yet I am not able to ssh nor ping to the VM in the default VPC.

1 Answer
0

It seems like you have checked most of the common configurations, but there might be some other factors that could be causing the issue. Here are a few additional things you can check:

  1. Network ACL (NACL): Double-check the Network ACL associated with the public subnet in your default VPC. Ensure that the inbound and outbound rules allow SSH (port 22) and ICMP traffic (for ping).

  2. Internet Gateway (IGW): Verify that the Internet Gateway is correctly attached to your default VPC. You can check this in the VPC console by selecting your default VPC and looking for the Internet Gateway ID under the "Internet Gateways" section.

  3. Route Table Association: Ensure that the public subnet in your default VPC is associated with the correct route table that has a route to the Internet Gateway (0.0.0.0/0 => IGW).

  4. Source/Destination Check: Check the "Source/Destination Check" setting on the instance in the default VPC. This should be enabled by default, but if it's disabled, it could prevent the instance from responding to traffic.

  5. Security Group Rules: Although you mentioned that the security group allows all traffic, double-check the rules for both inbound and outbound traffic. Sometimes, rules can be misconfigured or overwritten.

  6. Network Interface: Check if the network interface attached to the instance in the default VPC is correctly configured. Ensure that it has a public IP address and is associated with the correct subnet.

  7. Firewall Rules on your laptop or network: If you're trying to connect from a specific IP address or network, ensure that there are no firewall rules on your local machine or network that could be blocking the connection.

If you've checked all of these and the issue persists, you may want to consider creating a new default VPC and launching a new instance to see if the problem is specific to the current default VPC or the instance itself.

AWS
answered 2 years ago
EXPERT
reviewed 2 years ago
  • I have checked all the above, and I am still not able to connect. To minimize the damage I have detached the volume of one VM and attached it to another VM to recover the data, but I really like to solve the problem, since this is not the only VM I am interested in. All the VMs in this VPC are unreachable. What is surprising is AWS reports instant connectivity check has passed for every instances in this VPC.

You are not logged in. Log in to post an answer.

A good answer clearly answers the question and provides constructive feedback and encourages professional growth in the question asker.